{ "id": "CVE-2008-0940", "sourceIdentifier": "cve@mitre.org", "published": "2008-02-25T20:44:00.000", "lastModified": "2024-11-21T00:43:16.457", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cross-site scripting (XSS) vulnerability in Plain Black WebGUI before 7.4.24 allows remote attackers to inject arbitrary web script or HTML when creating a username, a different vulnerability than CVE-2007-0407." }, { "lang": "es", "value": "Vulnerabilidad de secuencias de comandos en sitios cruzados (XSS) en Plain Black WebGUI antes de 7.4.24 permite a atacantes remotos inyectar secuencias de comandos web o HTML de su elecci\u00f3n cuando se crea un nombre de usuario, una vulnerabilidad distinta a CVE-2007-0407." } ], "metrics": { "cvssMetricV2": [ { "source": "nvd@nist.gov", "type": "Primary", "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, "impactScore": 2.9, "acInsufInfo": false, "obtainAllPrivilege": false, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": true } ] }, "weaknesses": [ { "source": "nvd@nist.gov", "type": "Primary", "description": [ { "lang": "en", "value": "CWE-79" } ] } ], "configurations": [ { "nodes": [ { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, "criteria": "cpe:2.3:a:webgui:webgui:7.4:*:*:*:*:*:*:*", "matchCriteriaId": "F9C9099E-5BF3-432E-8F8C-0E30E6E88B39" }, { "vulnerable": true, "criteria": "cpe:2.3:a:webgui:webgui:7.4.2:*:*:*:*:*:*:*", "matchCriteriaId": "2697D591-553B-4183-B890-98A1C3FDE80F" }, { "vulnerable": true, "criteria": "cpe:2.3:a:webgui:webgui:7.4.3:*:*:*:*:*:*:*", "matchCriteriaId": "2228E124-980F-4AF6-B7C5-7173B921487B" }, { "vulnerable": true, "criteria": "cpe:2.3:a:webgui:webgui:7.4.4:*:*:*:*:*:*:*", "matchCriteriaId": "371C0312-D203-4E7D-9A36-57770222E459" }, { "vulnerable": true, "criteria": "cpe:2.3:a:webgui:webgui:7.4.5:*:*:*:*:*:*:*", "matchCriteriaId": "87A79FC3-A1AB-4F04-9D00-97801A5183D5" }, { "vulnerable": true, "criteria": "cpe:2.3:a:webgui:webgui:7.4.6:*:*:*:*:*:*:*", "matchCriteriaId": "C79D2667-ED6E-457A-B1AF-69B8D027F0AD" }, { "vulnerable": true, "criteria": "cpe:2.3:a:webgui:webgui:7.4.7:*:*:*:*:*:*:*", "matchCriteriaId": "6DACB4C4-8F7C-476B-B6C3-70C85B2CE8F7" }, { "vulnerable": true, "criteria": "cpe:2.3:a:webgui:webgui:7.4.8:*:*:*:*:*:*:*", "matchCriteriaId": "415DEEE6-1F80-43EB-9C4D-F215A4475B8B" }, { "vulnerable": true, "criteria": "cpe:2.3:a:webgui:webgui:7.4.9:*:*:*:*:*:*:*", "matchCriteriaId": "7D6747BF-11E1-41BD-A73E-9151740CA6E9" }, { "vulnerable": true, "criteria": "cpe:2.3:a:webgui:webgui:7.4.10:*:*:*:*:*:*:*", "matchCriteriaId": "D61CFDF7-8438-4201-A53D-7CDD7CEC7A50" }, { "vulnerable": true, "criteria": "cpe:2.3:a:webgui:webgui:7.4.11:*:*:*:*:*:*:*", "matchCriteriaId": "8E44D6BD-50D7-4A90-9C5F-647FA31F4C9D" }, { "vulnerable": true, "criteria": "cpe:2.3:a:webgui:webgui:7.4.12:*:*:*:*:*:*:*", "matchCriteriaId": "AB48AEDC-1F37-4CEE-98AC-1D0509FC00CA" }, { "vulnerable": true, "criteria": "cpe:2.3:a:webgui:webgui:7.4.13:*:*:*:*:*:*:*", "matchCriteriaId": "C2FEC347-08CC-4C60-94AB-23A3CE1971CD" }, { "vulnerable": true, "criteria": "cpe:2.3:a:webgui:webgui:7.4.14:*:*:*:*:*:*:*", "matchCriteriaId": "3A9A1984-91C9-4A57-88DD-673AE49C1250" }, { "vulnerable": true, "criteria": "cpe:2.3:a:webgui:webgui:7.4.15:*:*:*:*:*:*:*", "matchCriteriaId": "7262F96B-A760-45EA-AD88-CF7E42D0085F" }, { "vulnerable": true, "criteria": "cpe:2.3:a:webgui:webgui:7.4.16:*:*:*:*:*:*:*", "matchCriteriaId": "49227629-92BD-49A1-9C51-90DF0B40365C" }, { "vulnerable": true, "criteria": "cpe:2.3:a:webgui:webgui:7.4.17:*:*:*:*:*:*:*", "matchCriteriaId": "2363AA20-0467-414E-B7A1-64F6B9867B06" }, { "vulnerable": true, "criteria": "cpe:2.3:a:webgui:webgui:7.4.18:*:*:*:*:*:*:*", "matchCriteriaId": "AB553BEA-4120-431D-A946-F990C931E102" }, { "vulnerable": true, "criteria": "cpe:2.3:a:webgui:webgui:7.4.23:*:*:*:*:*:*:*", "matchCriteriaId": "9AA5199D-E38A-4114-A2C5-B8AC5A9DDB9D" } ] } ] } ], "references": [ { "url": "http://secunia.com/advisories/28967", "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ] }, { "url": "http://www.plainblack.com/getwebgui/advisories/webgui-7_4_24-stable-released", "source": "cve@mitre.org" }, { "url": "http://www.securityfocus.com/bid/27869", "source": "cve@mitre.org", "tags": [ "Patch" ] }, { "url": "http://secunia.com/advisories/28967", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ] }, { "url": "http://www.plainblack.com/getwebgui/advisories/webgui-7_4_24-stable-released", "source": "af854a3a-2127-422b-91ae-364da2661108" }, { "url": "http://www.securityfocus.com/bid/27869", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ] } ] }